/
/

How To Configure Forward and Reverse DNS Lookups the Right Way

by Lauren Ballejos, IT Editorial Expert
How To Configure Forward and Reverse DNS Lookups the Right Way blog banner image

Instant Summary

This NinjaOne blog post offers a comprehensive basic CMD commands list and deep dive into Windows commands with over 70 essential cmd commands for both beginners and advanced users. It explains practical command prompt commands for file management, directory navigation, network troubleshooting, disk operations, and automation with real examples to improve productivity. Whether you’re learning foundational cmd commands or mastering advanced Windows CLI tools, this guide helps you use the Command Prompt more effectively.

Key Points

  • Forward and Reverse DNS are Separate Systems: Adding a DNS name does not create the corresponding reverse entry, so both sides must be managed separately.
  • Missing Reverse DNS Causes Subtle but Serious Problems: Most systems will still connect. However, email delivery, security tools, and logs become unreliable or harder to trust.
  • DNS Requires Ongoing Cleanup to Stay Accurate: DHCP changes, aging, and scavenging are required to prevent old or incorrect records from piling up over time and cluttering the system.
  • Reverse DNS Matters Where Identity and Trust are Required: Email servers, security monitoring, and admin tools depend on it more than general user subnets.
  • Clear Ownership and Regular Checks Prevent Silent Failures: Limiting access, logging changes, and validating client lookups keep DNS dependable and auditable.

Forward and reverse DNS setup and configuration mistakes can severely impact connectivity and security on your enterprise network. This guide explains the best practices to follow when you configure forward and reverse DNS lookups, including PTR records, DNS aging, and scavenging.

What is DNS?

DNS (Domain Name System) is the distributed client-server system that associates domain names (like www.example.com) with the IP addresses of servers. It exists so that you can use names to navigate to websites, send emails, and access other services, rather than having to use hard-to-remember IP addresses. DNS servers store DNS records that map names to IP addresses, which your devices then look up using a DNS resolver. DNS records are divided into zones by domain or subdomain for manageability, with each zone having its own zone file where records are recorded.

What is the difference between forward and reverse DNS lookup?

A forward DNS lookup is performed when a domain name is entered, and an IP address (either IPv4 or IPv6) is returned. A reverse DNS lookup is the opposite: when an IP address is entered, and the associated domain name is returned.

This requires a PTR record (pointer record) that uses a special in-addr.arpa (.ip6.arpa for IPv6) domain name to store IP addresses with their segments reversed. For example, 192.168.0.1 becomes 1.0.168.192.in-addr.arpa. These are stored in their own zone, and without a PTR record, reverse DNS doesn’t work as it has no way to determine what domain name is associated with an IP address.

Why you need both forward and reverse DNS

Forward and reverse DNS lookup zones are not automatically synchronized, and creating a forward DNS record does not create the inverse, so you need to maintain both. Reverse DNS and PTR records are not a requirement when setting up DNS (unlike forward lookups, as without them the whole DNS system would be pointless), and are often left unconfigured. However, they are vital for some use cases, particularly email.

Email spam detection tools use reverse DNS to check whether the email actually came from the server it claims to have originated from, helping to prevent spam and email spoofing attacks. Most email systems will reject any messages that come from a domain that doesn’t have reverse DNS configured.

Reverse DNS is also useful for IT administrators and developers who want human-readable domain names to appear in queries and log files.

What you need to set up forward and reverse DNS lookup zones

There are established best practices that you should follow when creating forward and reverse DNS lookup zones to prevent network problems and help ensure security.

DNS best practiceOutcomeActual value delivered
Forward and reverse DNS record parityAccurate record mappingLogs and security analytics are more accurate and understandable
Secure DHCP updatesRegularly refreshed DNS dataFewer stale or missing records
DNS record aging and scavengingBetter DNS hygieneCleaner zone records over time
Validation from DNS clientsAssurance that DNS is functioning correctlyConfidence in functionality and security posture
Access control and loggingGovernance and oversightReliable, auditable DNS operations

To achieve these, you’ll need the following:

  • A list of authoritative DNS zones and IP subnets that require reverse lookup zones
  • Access to DNS and DHCP administration tools
  • Defined change windows for configuration, testing, and deployment
  • Test hosts in each site or subnet for client validation
  • Command-line or PowerShell access for DNS lookup and cache checks

Best practice 1: Plan zones and DNS records, and assign ownership

Planning is key to the long-term effectiveness of any IT system. When designing your DNS implementation, carefully map out your forward zones and subdomains, then your reverse zones, ensuring parity. While reverse DNS isn’t mandatory, make sure it’s configured for zones that handle outgoing email. Ownership also helps to maintain the reliability and security of your DNS system, while helping keep your IT team optimized.

Best practice 2: Create the right kinds of records for forward lookups

Make sure you create the right kind of DNS records when configuring your DNS system. Use A and AAAA records for static hosts and key services, and CNAME (canonical name) records for client-facing names that may be subject to change. This way, you do not need to update client configurations that point to CNAME records if the domain name they alias changes.

Best practice 3: Create reverse lookup zones and PTRs that match forward DNS records

When creating the PTR records for your reverse lookup zones, make sure they match your existing A and AAAA records. For subnets that you do not manage, ensure that the upstream authority is correct for public networks, or coordinate delegation with the controlling party.

Best practice 4: Enable secure dynamic updates with DHCP

Automatic DNS registration via DHCP can be used where it is supported by your DHCP server (this is known as ‘DNS dynamic updates’ on Windows Server). This allows client devices to update their records with the DNS server when their IP address changes, reducing the need for manual administration. Use secure updates and configure aging and scavenging with appropriate timing (based on how devices behave on your network) to further improve overall network hygiene and security.

Best practice 5: Validate resolution and caching end-to-end

On client devices (for example, Windows workstations), use local DNS testing tools to test forward and reverse lookups and ensure that they are configured correctly and being applied. Use the nslookup or ipconfig commands from the Windows Command Prompt, or Resolve-DnsName from PowerShell. On Linux or macOS, use the dig DNS lookup utility.

You can automate the execution and collect the output from the above commands on client devices by using remote monitoring and management (RMM) platforms. You should also monitor DNS server logs after changes are made to confirm successful registrations.

Best practice 6: Troubleshoot common failures

There are several common problems to watch out for after making changes to your forward and reverse DNS zones:

  • Forward lookups work, but reverse lookups fail when matching PTR records have not been created.
  • Reverse DNS lookups resolving the wrong name is usually caused by stale PTR records or duplicate A/AAAA records.
  • NXDOMAIN (Non-Existent Domain) errors are caused when a record for the domain cannot be found.
  • Local hosts file overrides on clients may interfere with both forward and reverse lookups.

There are also a number of other reasons a DNS server may not respond, such as timeouts, firewalls, and unreachable servers that can be troubleshooted both at the client and network level.

Best practice 7: Governance and security

DNS is a core component of your network, and flawed configurations can be used to further cyberattacks. Restrict who can manage records, and log and review all changes. Regularly review your aging and scavenging settings to make sure that your DHCP and DNS records are clean and that there isn’t a buildup of stale records. Watch for unusual volumes of new A or PTR records that could indicate a DNS spoofing attack.

NinjaOne automates the configuration and validation of forward and reverse DNS

The best-planned DNS systems are still prone to degradation due to configuration drift, stale records, and changing requirements if not continually monitored and maintained.

NinjaOne provides an automated IT monitoring and management platform that can schedule jobs to export DNS and DHCP records and logs, compare them against active leases and inventory, and flag missing PTRs and stale records. Validation lookups can be scripted from clients to ensure end-to-end functionality, and reports can be generated and stored in the NinjaOne built-in IT documentation platform.

When action is required, NinjaOne can automatically generate help desk tickets and escalate if necessary, ensuring your DNS system is always configured following best practices, and reducing its risk as a cybersecurity threat vector.

FAQs

While creating reverse DNS zones is best practice, it’s not necessary for every subnet. Create reverse zones for subnets where you require accurate name-to-IP mapping for logging, security, or admin tools, and especially if you are hosting email servers.

Reverse DNS does not function at all without the relevant PTR records existing. Without PTRs, many tools and logs will only show IPs, reducing clarity in audits and investigations. Email is very unlikely to be delivered if reverse DNS is not correctly configured.

For improved management and security, it is best practice to use secure dynamic updates where they are supported, so that DHCP registers DNS records on behalf of clients.

Configure DNS record aging and scavenging to maintain DNS hygiene, and ensure DHCP lease events trigger updates for both A/AAAA and PTR records.

Use CNAME (Canonical Name) DNS records as an alias for user-facing names so you can move services without altering client configurations.

Forward and reverse DNS drift when DHCP churn, manual changes, or missing aging and scavenging update one side without the other. This causes hard-to-trace issues where systems appear to be working, but logs, security tools, and email checks become unreliable.

You might also like

Ready to simplify the hardest parts of IT?